These past few days, I have been reading a transcript of your speech at the Military Academy on 18 September [1966] and, to be frank, some of the key formulations in it are highly erroneous.
This article examines a group of Song-dynasty biji 筆記 anecdotes featuring the Northern Song literary giant Su Shi 蘇軾 playfully engaging with Buddhist encounter dialogues. These religious accounts are well known for their riddle-like language and the baffling effect they create among their readers, prompting the question of whether they were read for humor. Previous scholarship on encounter dialogues focuses on the religious perspective, demonstrating that their perplexing language and rheto- ric serve pedagogical and monastic functions. By contrast, this article (...) explores Chan Buddhist humor from the perspective of the literati and vernacular culture by examining how encounter dialogues were incorporated in Song-dynasty vernacu- lar plays and literati storytelling. Focusing on stories that depict Su Shi’s playful engagement with encounter dialogues as a case study, this article reveals that an important part of Su Shi’s humorous image is inspired and shaped by Buddhism. It also shows that humor in these biji stories is contingent on the readers’ knowledge of Chan literature such as “recorded dialogues” and “transmission records”, which were popular among literati during the Song. The anecdotal materials preserved in biji suggests a mutual influence between Chan literature and vernacular entertainment during the Song. I argue that, in addition to religious functions, literary factors of performance and aesthetics played sig- nificant roles in conditioning the entertaining effect of encounter dialogues, par- ticularly when they were received outside of monastic circles. (shrink)
Mr. Tang Junyi is the son of the great scholar of Sichuan, Mr. Tang Difeng. As a child, he received much of the nurturing influence of the scholarship in his family; he was a wise young man from a very tender age, with many unusual thoughts. Since the publication of his essay "The theory of Nature in Xun Zi's Thought" when he was fifteen years old and still in middle school, Mr. Tang has pursued the road of a scholar and (...) a thinker with the utmost dedication, as indefatigably today, after several decades, as if it were only the beginning. In the end, with his accomplishments of moral conduct and wisdom, his widespread and profound influence as a teacher, and his magnificent accomplishments in scholarship, he has established an unmatched reputation among academic circles both at home and abroad, and has become an epoch-making philosopher of contemporary China who has stood far above his generation, remained unbent and unsubdued by the test of time, and has established his own school of thought for the ages. (shrink)
This study was designed to estimate the associations between self-efficacy and professional identity. A total of 1,051 freshmen nursing students from the Be Resilient to Nursing Career program were recruited from four universities between September and November 2020. A latent profile and moderated meditation analysis were performed. Four profiles of self-efficacy were identified and named as Lowest, Med-low, Med-high, and Highest. The mediating role of resilience and the moderating effect of role models were also identified. Therefore, self-efficacy, resilience, and role (...) models may be three important factors to professional identity in FNSs and these relationships should be further validated in longitudinal or interventional studies. (shrink)
The Drunken Man’s Talk: Tales from Medieval China. By Luo Ye. Translated by Alister D. Inglis. Seattle: University of Washington Press, 2015. Pp. xxiii + 214. $50 ; $30.
This study explored the relations between the social support network of mothers of children with autism spectrum disorder, perceived social support, and their subjective wellbeing. The participants were mothers of children with ASD in Shanghai. Their social support network structure was explored via the nomination method. Perceived social support was measured using the Revised Social Provisions Scale for Autism, and the mothers’ subjective wellbeing was assessed using the Index of Wellbeing, Index of General Affect. A significant correlation was observed between (...) the subjective wellbeing of mothers of children with ASD and perceived social support. Meanwhile, perceived social support was significantly correlated with the effectiveness of overall social support. Finally, perceived social support was also significantly correlated with the network size of social support. Moreover, the effectiveness of social support was significantly associated with the network size of social support and was highly significantly associated with the degree of intimacy of social support. Furthermore, the network size of instrumental support has a significant influence on all perceived social support subdimensions. Overall, social support effectiveness plays an important role in the social support network mechanism on perceived social support and subjective wellbeing in China. (shrink)
More than half a century ago Charles A. Moore, the founder and editor of Philosophy East and West, foresaw in its first issue a new stage in the development of philosophy "characterized by transcultural co-operation and world perspective". Although Moore's enthusiastic vision of "a synthesis between Eastern and Western philosophy" was questioned by other leading philosophers regarding its validity and possibility,1 "the important area of East-West Philosophy" and the comparative approach have been recognized by an increasing number of philosophers worldwide. (...) Convinced by the mutual complementarity and significant enrichment of research by this emerging sub-discipline, Masson-Oursel and... (shrink)
Consumer indirect misbehavior in access-based consumption is a significant challenge for enterprises. The literature is in short of a deep understanding of the antecedent conditions of consumer indirect misbehavior in this context and limited by inconsistent findings, calling for developing a holistic and integrative theoretical framework. This study integrates three commonly used theoretical perspectives in the consumer misbehavior literature to present holistic archetypes of consumer indirect misbehavior formation. In accordance with this theoretical objective, we adopted an emerging approach for configurational (...) analysis, i.e., fuzzy-set qualitative comparative analysis, to analyze the complex combinations of six influencing factors. We collected data using a scenario-based field survey of 264 experienced consumers of a popular bike-sharing service in China. The scenarios were developed based on relevant literature and a Delphi study. The fsQCA results reveal multiple configurations for high and low levels of consumer misbehavior intention. Specifically, perceived benefits and moral definition play important roles, while the effect of sanctions is highly dependent on other factors. These results lead us to derive three theoretical propositions for antecedent conditions leading to consumers’ indirect misbehavior intentions in access-based consumption. This study enriches our understanding of the causes of misbehavior and provides novel insights for management practitioners to take appropriate countermeasures. (shrink)
The development and application of artificial intelligence (AI) technology has raised many concerns about privacy violations in the public. Thus, privacy-preserving computation technologies (PPCTs) have been developed, and it is expected that these new privacy protection technologies can solve the current privacy problems. By not directly using raw data provided by users, PPCTs claim to protect privacy in a better way than their predecessors. They still have technical limitations, and considerable research has treated PPCTs as a privacy-protecting tool and focused (...) on possible technical improvements. In this article, we argue that PPCTs cannot effectively protect privacy in the narrow sense due to their technical limitations. Moreover, although these shortcomings could be remedied, they still fall into a paradox because their aim is to protect privacy, but they could reveal private information from users. This paradox of privacy protection not only aggravates the social impact arising from AI privacy issues but may also make the current privacy protection lose its meaning, resulting in a situation in which privacy protection is useless. (shrink)
In this paper I scrutinize the “rational beliefs” in the concept of rationalizability in strategic games [Bernheim, Pearce ]. I illustrate through an example that a rationalizable strategy may not be supported by a “rational belief”, at least under one plausible interpretation of “rational belief”. I offer an alternative formulation of “rational belief” in the concept of rationalizability, which yields a novel epistemic interpretation of the notion of point-rationalizability.
We attempt to understand the personal incentives that motivate corporate insiders to engage in unethical behavior such as delayed trade disclosure. Delayed disclosure affects corporate transparency and other shareholders in the firm potentially suffer investment losses because they are unaware of insiders’ activities. Using archival data from the 300 largest Australian firms between 2007 and 2011, the results show that risk factors such as insider age and tenure and wealth effects in the form of insider shareholdings affect the likelihood of (...) delayed reporting. Governance positions such as committee membership mitigate this behavior. Our study highlights the importance of considering individual insider’s wealth and risk factors. The self-monitoring role of governance positions is also indicative of the effectiveness of internal corporate governance in the prevention of illegal insider behavior. (shrink)
The North Atlantic Treaty Organization bombing of China's embassy in Yugoslavia on May 7, 1999, triggered a sharp reaction from the Chinese government, and for three consecutive days after May 8 there were violent anti-American demonstrations, with the emergence of a powerful wave of anti-American nationalism among the populace in mainland China. The May Eighth Incident was the most important political incident in China in the 1990s. Not only will this incident have a major impact on relations between China and (...) the United States, and among China and its peripheral countries and regions, but the nationalism it has triggered will be a constant and major political factor with far-reaching effects on the political culture and political options in the era of "post-omnipotentism". (shrink)
The conceptual changes of Jian儉 in the pre-Qin period were the results of changes in the social and political structure. It originally referred to Jian virtue, which was a kind of political norm of clan states. This required the aristocrats to be moderate in accordance with the patriarchal hierarchy and generously share their wealth with their own clansmen. The opposite of Jian virtue is Tan and Chi. In the middle of the Spring and Autumn Period, many states formed their politics (...) based on ministerial families. The aristocrats glorified greed and extravagance as Fu, and stigmatized Jian virtue as Pin. After the collapse of the clan-based state order, the states in the Warring States Period gradually developed into territorial states, and the institutional political norm became a new, abstract concept, indicated by the compound Jian Yue and was used to describe the consumption attitudes of individuals and families. Meanwhile, with the increase of social mobility, the pursuit of riches was highly popular in the ideological world. The new expression of “means-ends” advocated by Legalists, which stipulated that individuals and families acquire wealth through Jian Yue, took shape and endures to this day. (shrink)
From the perspective of entrepreneurial team processes, this study examines the effect of dynamic team environment on entrepreneurial team innovation. Through applying the uncertainty reduction theory and group process theory, this study proposes the influence mechanism and boundary condition of the relationship between dynamic team environment on entrepreneurial team innovation. By analyzing a sample of 270 entrepreneurial teams in China, this study found that dynamic team environment could evoke entrepreneurial team innovation via triggering team members’ agreement seeking behavior and then (...) promoting team knowledge integration. In addition, team centralization of decision making can weaken the relationship between agreement seeking behavior and team knowledge integration. Our findings contribute to a better understanding of entrepreneurial teams’ reactions to dynamic environment and the multistep mechanism that transfers the impact of dynamic team environment to entrepreneurial team innovation through team members’ reactions and team interactions. (shrink)
Heart disease is the deadliest disease and one of leading causes of death worldwide. Machine learning is playing an essential role in the medical side. In this paper, ensemble learning methods are used to enhance the performance of predicting heart disease. Two features of extraction methods: linear discriminant analysis and principal component analysis, are used to select essential features from the dataset. The comparison between machine learning algorithms and ensemble learning methods is applied to selected features. The different methods are (...) used to evaluate models: accuracy, recall, precision, F-measure, and ROC.The results show the bagging ensemble learning method with decision tree has achieved the best performance. (shrink)
The energy spectra for two electrons in a parabolic quantum dot are calculated by the quantization rule approach. The numerical results are in excellent agreement with the results by the method of integrating directly the Schrödinger equation, and better than those by the WKB method and the WKB-DP method.
Conditional automated driving [level 3, Society of Automotive Engineers ] requires drivers to take over the vehicle when an automated system’s failure occurs or is about to leave its operational design domain. Two-stage warning systems, which warn drivers in two steps, can be a promising method to guide drivers in preparing for the takeover. However, the proper time intervals of two-stage warning systems that allow drivers with different personalities to prepare for the takeover remain unclear. This study explored the optimal (...) time intervals of two-stage warning systems with insights into the drivers’ neuroticism personality. A total of 32 drivers were distributed into two groups according to their self-ratings in neuroticism. Each driver experienced takeover under the two-stage warning systems with four time intervals. The takeover performance and subjective opinions for time intervals and situation awareness were recorded. The results showed that drivers in the 5-s time interval had the best takeover preparation. Furthermore, both the 5- and 7-s time intervals resulted in more rapid takeover reactions and were rated more appropriate and useful than the 3- and 9-s time intervals. In terms of personality, drivers with high neuroticism tended to take over immediately after receiving takeover messages, at the cost of SA deficiency. In contrast, drivers with low neuroticism responded safely by judging whether they gained enough SA. We concluded that the 5-s time interval was optimal for drivers in two-stage takeover warning systems. When considering personality, drivers with low neuroticism had no strict requirements for time intervals. However, the extended time intervals were favorable for drivers with high neuroticism in developing SA. The present findings have reference implications for designers and engineers to set the time intervals of two-stage warning systems according to the neuroticism personality of drivers. (shrink)
Multiway join queries incur high-cost I/Os operations over large-scale data. Exploiting sharing join opportunities among multiple multiway joins could be beneficial to reduce query execution time and shuffled intermediate data. Although multiway join optimization has been carried out in MapReduce, different design principles are not considered. To bridge the gap of not considering the optimization of Big Data platforms, an end-to-end multiway join over Flink, which is called Join-MOTH system, is proposed to exploit sharing data granularity, sharing join granularity, and (...) sharing implicit sorts within multiple join queries. For sharing data, our previous work, Multiquery Optimization using Tuple Size and Histogram system, has been introduced to consider the granularity of sharing data opportunities among multiple queries. For sharing sort, our previous work, Sort-Based Optimizer for Big Data Multiquery, has been introduced to consider the implicit sorts among join queries. For sharing join, additional modules have been tailored to the J-MOTH optimizer to optimize sharing work by exploiting shared pipelined multiway join among multiple multiway join queries. The experimental evaluation has demonstrated that the J-MOTH system outperforms the naive and the state-of-the-art techniques by 44% for query execution time using TPC-H queries. Also, the proposed J-MOTH system introduces maximal intermediate data size reduction by 30% in average over Hadoop-like infrastructures. (shrink)
In contemporary China, physicians tend to require more diagnostic work-ups and prescribe more expensive medications than are clearly medically indicated. These practices have been interpreted as defensive medicine in response to a rising threat of potential medical malpractice lawsuits. After outlining recent changes in Chinese malpractice law, this essay contends that the overuse of expensive diagnostic and therapeutic interventions cannot be attributed to malpractice concerns alone. These practice patterns are due as well, if not primarily, to the corruption of medical (...) decision-making by physicians being motivated to earn supplementary income, given the constraints of an ill-structured governmental policy by the over-use of expensive diagnostic and therapeutic interventions. To respond to these difficulties of Chinese health care policy, China will need not only to reform the particular policies that encourage these behaviors, but also to nurture a moral understanding that can place the pursuit of profit within the pursuit of virtue. This can be done by drawing on Confucian moral resources that integrate the pursuit of profit within an appreciation of benevolence. It is this Confucian moral account that can formulate a medical care policy suitable to China's contemporary market economy. (shrink)